3-bars-3-questions

July 9, 2013

When to Consider Riak for Your Big Data Architecture

In my Breaking Down 'Big Data' – Database Models, I briefly covered the most common database models, their strengths, and how they handle the CAP theorem — how a distributed storage system balances demands of consistency and availability while maintaining partition tolerance. Here's what I said about Dynamo-inspired databases:

What They Do: Distributed key/value stores inspired by Amazon's Dynamo paper. A key written to a dynamo ring is persisted in several nodes at once before a successful write is reported. Riak also provides a native MapReduce implementation.
Horizontal Scaling: Dynamo-inspired databases usually provide for the best scale and extremely strong data durability.
CAP Balance: Prefer availability over consistency
When to Use: When the system must always be available for writes and effectively cannot lose data.
Example Products: Cassandra, Riak, BigCouch

This type of key/value store architecture is very unique from the document-oriented MongoDB solutions we launched at the end of last year, so we worked with Basho to prioritize development of high-performance Riak solutions on our global platform. Since you already know about MongoDB, let's take a few minutes to meet the new kid on the block.

Riak is a distributed database architected for availability, fault tolerance, operational simplicity and scalability. Riak is masterless, so each node in a Riak cluster is the same and contains a complete, independent copy of the Riak package. This design makes the Riak environment highly fault tolerant and scalable, and it also aids in replication — if a node goes down, you can still read, write and update data.

As you approach the daunting prospect of choosing a big data architecture, there are a few simple questions you need to answer:

  1. How much data do/will I have?
  2. In what format am I storing my data?
  3. How important is my data?

Riak may be the choice for you if [1] you're working with more than three terabytes of data, [2] your data is stored in multiple data formats, and [3] your data must always be available. What does that kind of need look like in real life, though? Luckily, we've had a number of customers kick Riak's tires on SoftLayer bare metal servers, so I can share a few of the use cases we've seen that have benefited significantly from Riak's unique architecture.

Use Case 1 – Digital Media
An advertising company that serves over 10 billion ads per month must be able to quickly deliver its content to millions of end users around the world. Meeting that demand with relational databases would require a complex configuration of expensive, vertically scaled hardware, but it can be scaled out horizontally much easier with Riak. In a matter of only a few hours, the company is up and running with an ad-serving infrastructure that includes a back-end Riak cluster in Dallas with a replication cluster in Singapore along with an application tier on the front end with Web servers, load balancers and CDN.

Use Case 2 – E-commerce
An e-commerce company needs 100-percent availability. If any part of a customer's experience fails, whether it be on the website or in the shopping cart, sales are lost. Riak's fault tolerance is a big draw for this kind of use case: Even if one node or component fails, the company's data is still accessible, and the customer's user experience is uninterrupted. The shopping cart structure is critical, and Riak is built to be available ... It's a perfect match.

As an additional safeguard, the company can take advantage of simple multi-datacenter replication in their Riak Enterprise environment to geographically disperse content closer to its customers (while also serving as an important tool for disaster recovery and backup).

Use Case 3 – Gaming
With customers like Broken Bulb and Peak Games, SoftLayer is no stranger to the gaming industry, so it should come as no surprise that we've seen interesting use cases for Riak from some of our gaming customers. When a game developer incorporated Riak into a new game to store player data like user profiles, statistics and rankings, the performance of the bare metal infrastructure blew him away. As a result, the game's infrastructure was redesigned to also pull gaming content like images, videos and sounds from the Riak database cluster. Since the environment is so easy to scale horizontally, the process on the infrastructure side took no time at all, and the multimedia content in the game is getting served as quickly as the player data.

Databases are common bottlenecks for many applications, but they don't have to be. Making the transition from scaling vertically (upgrading hardware, adding RAM, etc.) to scaling horizontally (spreading the work intelligently across multiple nodes) alleviates many of the pain points for a quickly growing database environment. Have you made that transition? If not, what's holding you back? Have you considered implementing Riak?

-@marcalanjones

June 4, 2013

IBM to Acquire SoftLayer

As most have seen by now, this morning we announced IBM's intent to acquire SoftLayer. It's not just big news, it's great news for SoftLayer and our customers. I'd like to take a moment and share a little background on the deal and pass along a few resources to answer questions you may have.

We founded SoftLayer in 2005 with the vision of becoming the de facto platform for the Internet. We committed ourselves to automation and innovation. We could have taken shortcuts to make a quick buck by creating manual processes or providing one-off services, but we invested in processes that would enable us to build the strongest, most scalable, most controllable foundation on which customers can build whatever they want. We created a network-within-a-network topology of three physical networks to every SoftLayer server, and all of our services live within a unified API. "Can it be automated?" was not the easiest question to ask, but it's the question that enabled us to grow at Internet scale.

As part of the newly created IBM Cloud Services division, customers and clients from both companies will benefit from a higher level of choice and a higher level of service from a single partner. More important, the real significance will come as we merge technology that we developed within the SoftLayer platform with the power and vision that drives SmartCloud and pioneer next-generation cloud services. It might seem like everyone is "in the cloud" now, but the reality is that we're still in the early days in this technology revolution. What the cloud looks like and what businesses are doing with it will change even more in the next two years than it has in the last five.

You might have questions in the midst of the buzz around this acquisition, and I want you to get answers. A great place to learn more about the deal is the SoftLayer page on IBM.com. From there, you can access a FAQ with more information, and you'll also learn more about the IBM SmartCloud portfolio that SoftLayer will compliment.

A few questions that may be top of mind for the customers reading this blog:

How does this affect my SoftLayer services?
Between now and when the deal closes (expected in the third quarter of this year), SoftLayer will continue to operate as an independent company with no changes to SoftLayer services or delivery. Nothing will change for you in the foreseeable future.

Your SoftLayer account relationships and support infrastructure will remain unchanged, and your existing sales and technical representatives will continue to provide the support you need. At any time, please don't hesitate to reach out to your SoftLayer team members.

Over time as any changes occur, information will be communicated to customers and partners with ample time to allow for planning and a smooth transition. Our customers will benefit from the combined technologies and skills of both companies, including increased investment, global reach, industry expertise and support available from IBM, along with IBM and SoftLayer's joint commitment to innovation.

Once the acquisition has been completed, we will be able to provide more details.

What does it mean for me?
We entered this agreement because it will enable us to continue doing what we've done since 2005, but on an even bigger scale and with greater opportunities. We believe in its success and the opportunity it brings customers.

It's going to be a smooth integration. The executive leadership of both IBM and SoftLayer are committed to the long-term success of this acquisition. The SoftLayer management team will remain part of the integrated leadership team to drive the broader IBM SmartCloud strategy into the marketplace. And IBM is best-in-class at integration and has a significant track record of 26 successful acquisitions over the past three years.

IBM will continue to support and enhance SoftLayer's technologies while enabling clients to take advantage of the broader IBM portfolio, including SmartCloud Foundation, SmartCloud Services and SmartCloud Solutions.

-@lavosby

UPDATE: On July 8, 2013, IBM completed its acquisition of SoftLayer: http://sftlyr.com/30z

May 29, 2013

Tips from the Abuse Department: To Catch a Predator

We've all seen the emails exclaiming, "THE KING HAS SENT YOU 1,000,000$ US DOLLARS," or "I NEED A PERSONAL ASSISTANT PAYING 500$ A WEEK." Do people actually fall for these? The answer is YES, many do. They think, "What risk is there replying to this email and possibly getting $1,000,000 or even a fraction of that?" As it turns out, there's a lot of risk.

As the senior manager of SoftLayer's abuse department, I know all about these kinds of scams, and I thought I'd reply to one of those emails to show what the interaction usually looks like and explain how the scam works.

---------------------------------------------
From: "Freddy Scammer" <scammer@address>
To: "Freddy Scammer" <scammer@address>
Subject: PA URGENTLY NEEDED

Hi, I am looking for a Personal Assistant, Kindly let me know if you are interested, and i can send you more details. Thank you

Freddy Scammer
---------------------------------------------

First, notice that my address email address isn't listed in the TO field or even the CC field. I must be BCC'd along with many others. I've changed the scammer's fake name to a more fitting name, and I'll use masculine pronouns when I talk about "him." According to our friends over at 419scam.org, this guy has been flagged as a scammer using the same name and email address. The name he provided actually belongs to a company that produces lamps as well as an American historian who focuses on colonization, decolonization and African history.

In the initial message, you'll see that there's no "all or nothing" proposition. Just like any scam, the scammer requests and provides information slowly to reel in a victim.

I replied back:

---------------------------------------------
From: <MY-EMAIL-ADDRESS>
To: <scammer@address>
Subject: RE: PA URGENTLY NEEDED

Doing What?
---------------------------------------------

I wanted to keep it short to see if I could get him to tell me more. He didn't disappoint:

---------------------------------------------
From: Freddy Scammer <scammer@address>
To: <MY-EMAIL-ADDRESS>
Subject: Re: PA URGENTLY NEEDED

Hello

Thanks for your reply, I got your email through the Chamber of Commerce directory. I am looking for someone who can handle my business errands during his or her spare time. I need your service because I am constantly traveling abroad on a missionary trip to build homes for orphaned children and doing other business as we are franchise company into alot of things.

Responsibilities:
1. Receive my mail and drop them off. {Your location doesn't matter as long as you have a post office nearby}
2. Pay my bills.
3. pay our workers on a regular basis

I would have love to meet with you to discuss this job in more detail, but I am currently away on a missionary trip. If you decide to accept the position, please read the employment requirements listed below.
REQUIREMENTS:
A. You are an honest and trustworthy citizen.
B. You need to be able to check your email regular and answer calls.

The pay is $500 weekly and you are entitled to other additional incentives after 1 month if you are hardworking. First, If I were to mail you a payment to
pay people that are needed to and your payment for your service, where would you want it mailed to?

Secondly, how would you like your name to appear on the payment? Note, payment would come in form of Check.

Provide me with the following details below to get started.

Full Name:
Complete Address(No PO Box allowed):
City:
State:
Country:
Zip Code:
Home Phone:
Cell Phone:
Age:
Occupation(If any):
Alternative Email if available:

Awaiting your prompt reply.
---------------------------------------------

Sounds easy enough right? Well it is easy. Who couldn't use an extra $500 a week! But there are a few problems here. If this sounds a lot like a "money mule" (or money laundering) type of situation, that's because it is! A money mule is a person who transfers money acquired illegally (e.g., stolen) in person, through a courier service, or electronically, on behalf of others. The mule is paid for their services, typically a small part of the money transferred.

Money mules are often dupes recruited on-line for what they think is legitimate employment, not aware that the money they are transferring is the product of crime. The money is transferred from the mule's account to the scam operator, typically in another country. Similar techniques are used to transfer illegal merchandise.

After a quick Google search for a few of the sentences in his message, I found out that this guy is low-balling me! He's offering $600 a week in other listings ... I'm hurt! I replied to see if I could get him off script:

---------------------------------------------
From: <MY-EMAIL-ADDRESS>
To: <scammer@address>
Subject: RE: PA URGENTLY NEEDED

So all I have to do is receive packages and re-ship them to where you tell me to,, also receive payments and cash it out and re-pay workers? How will I be paying them, what method? How often will I have to mail packages out and how big are they, who will pay for shipping?
---------------------------------------------

He was quick to respond:

---------------------------------------------
From: Freddy Scammer <scammer@address>
To: <MY-EMAIL-ADDRESS>
Subject: Re: PA URGENTLY NEEDED

Your going to be receiving payment mostly and it has already been paid for, for the shipping . All you have to do is receive and go ahead and cash it ....... Then i will tell you what to do with the money or whoever to pay with it. got me?
---------------------------------------------

Color me amazed. All I have to do is receive a check and cash it?! What luck!

---------------------------------------------
From: <MY-EMAIL-ADDRESS>
To: <scammer@address>
Subject: RE: PA URGENTLY NEEDED
Ok seems easy enough. But I only have a PO BOX, why would this be a problem? I currently don't have a permanent address as I'm staying with a friend trying to get back on my feet and I'm not on the house lease so I can't receive mail here. Is that going to be a problem?
---------------------------------------------

Now none of this is true, but I knew that this would throw Freddy off of his game. Most scammers don't allow a post office box because they don't want to be scammed ... What's to prevent the "victim" from renting a P.O. Box for a month, getting the check, cashing it and cancelling that P.O. Box? That possibility is a risk that scammers don't like to take. There have even been reports that in some instances, the scammers will send goons to your house if you don't hold up your end of the deal.

This whole underground world that you can get quickly and easily sucked into is exciting isn't it?

---------------------------------------------
From: Freddy Scammer <scammer@address>
To: <MY-EMAIL-ADDRESS>
Subject: Re: PA URGENTLY NEEDED

I'm afraid a PO BOX will not suffice, you can perhaps use a family members address and we can start the payments as soon as you send me the info. Please reply with the most urgent intent as I only have a few positions left as my assistant.
---------------------------------------------

At this point, I didn't bother emailing back. It's pretty obvious how easy it could be for someone down on their luck financially (or just bored) to get sucked into this type of scam. What's actually happening here is that the scammer wants to send money from a compromised account to the victim's legit account and then have the victim withdraw 90%-95% of the money and send it to another account that the bad guy has legitimate access to (probably over-seas). The victim would get to keep 5% for their troubles. Often the checks that are sent won't clear, so a victim thinks the funds are in his/her account ... Money is forwarded to the scammer from the victim's legitimate account and it clears before the funds from the scammer's deposited check disappear.

In some instances, scammers will buy high-priced items online with stolen credit card numbers and have those items shipped to the victim's house. The victim will then ship them to a different address. The bad guy has nothing to lose, and the victim takes all the risk.

The challenge with pursuing these scammers from a legal perspective is that they are often based in regions and areas out of the jurisdiction of our law enforcement authorities. As a result, they usually aren't caught, and they just move along to their next unsuspecting victim.

If you receive a "too good to be true" email from someone you don't know, let me spoil the surprise for you: It's not true.

-Dody

Categories: 
May 27, 2013

Tech Wildcatters Pitch Day (From a Unique Perspective)

In a classic scene from Duck Soup, Groucho Marx (as Rufus T. Firefly) is given a report, and he responds, "Why a four-year-old child could understand this report. Run out and find me a four-year-old child. I can't make head or tail out of it." That deadpan line may have come from a movie that was released in 1933, but it alludes to an idea that's relevant to this day: Younger generations have a unique perspective, and their insights can be extremely valuable. James, my nine-year-old son, has a seemingly innate understanding of technology, and after watching TechStars Cloud graduates deliver their demo day pitches last year, he became very interested in startups. I can say this authoritatively because he's been bugging me for month to let him go to another session.

With his school year winding down, I decided I'd make a deal with him: He could join me at the Tech Wildcatters Pitch Day, but he'd have to write a blog about what he learned about each of the companies. When I saw the post he wrote, I realized that having a nine-year-old listen to elevator pitches from startups provides a great barometer for how well a presenter expressed the company's value proposition. I'll turn the floor over to James and let him share what he learned about the eleven companies that presented at #TWPitchDay2013:

Tech Wildcatters Demo Day

Today I went to the Granada Theater in Dallas with my dad to meet start up companies. They were doing presentations to investors to raise money.

My dad did the introduction for HedgeChatter. I really did not understand what the do, but my dad said they did "DID": They turn Data into Information so people can make better Decisions. Not sure what that really means but he seems to like their business.

Here is a quick summary of each of the companies and what they do:

Tech Wildcatters Demo DayVonciergeVoncierge.com@LittleDressBook
Voncierge is a virtual wedding website that lets brides find the time and day for appointments in a short time.

 

Tech Wildcatters Demo DayKlick PushKlickPush.com@KlickPush
Klick Push is redefining online advertising by intersecting it with digital music.

 

Tech Wildcatters Demo DayGroupRaiseGroupRaise.com@GroupRaise
GroupRaise is a platform for charitable organizers to set up fundraisers online at local restaurants.

 

Tech Wildcatters Demo DayScribeSenseScribeSense.com@ScribeSense
ScribeSense is a better way to track and improve student learning. Their online platform grades.

 

Tech Wildcatters Demo DayCrowdFeedCrowdFeed.co@CrowdFeed
CrowdFeed is an app that has a huge market, making music and merchandise available on the spot.

 

Tech Wildcatters Demo DaySmokePhoneSmokePhone.com@SmokePhone
Smokephone is a site that lets you save your ten precious digits from strangers, and then you can delete them at any time.

 

Tech Wildcatters Demo DayHedgeChatterHedgeChatter.com@HedgeChatter
HedgeChatter is a social analytics tool for the stock market. It helps investors make more money in less time (from 12 hours to 6).

 

Tech Wildcatters Demo DaySocialGlimpzSocialGlimpz.com@SocialGlimpz
SocialGlimpz is a market insight tool to glean insights from users and build consumer strategy. It is an alternative to slow, expensive tools in the market.

 

Tech Wildcatters Demo DayTalentizeTalentize.com@Talentize
Talentize is a website that lets DJs, actor, singers, artist, and models showcase themselves for jobs.

 

Tech Wildcatters Demo Day501Fund501Fund.com@501Fund
501Fund is a company that helps with fundraising and saving money.

 

Tech Wildcatters Demo DaySecure PressIDSecurePressID.com@SecurePressID
SecurepressID is a security company that lets your hand be the username and login to protect from hackers.

 

My favorite of all companies was GroupRaise. I like it because I like helping people, and that is what they do too! Klick Push was great too. They give you prizes like free music for getting to new levels in games. Maybe they can do that for Minecraft.

This is the second time I went to an event like this. Last year I met a lot of cool companies that came to Dallas from San Antonio. My dad said they were part of something called TechStars Cloud. I even presented to them about Steve Jobs. That made me nervous, but it was worth it.

I am already excited about going to my next demo day. And maybe someday I will be on the stage with a new idea.

-James Karidis

Tech Wildcatters Demo Day

May 23, 2013

The Power of the Internet: Breaking into Global Markets

The widespread adoption of smartphones and tablets has dramatically changed the way the world accesses the Internet recent years. Continued declines in smartphone cost will drive penetration even further into economies that have not had the buying power to join the Internet revolution. Over the next decade we'll see this market opportunity explode as these new users come on line. We are seeing the emergence of a new "middle class" being empowered by technology with the latest mobile applications and breakthroughs.

The power of the Internet resides in its ability to transcend borders. Application developers in Indonesia or Vietnam can happily find a virtual home selling into markets in North America without leaving the comfort of their sofas. Economic activity has been westward facing, serving the growing markets in developed nations with near universality of broadband access. Most consumers in developed countries have access to wireline broadband access (DSL, fiber, cable, etc.), while developing nations have suffered from under investment on this front. Much of this access has been driven by an economic imperative: Households in these markets demand fast connections, and they have the disposable income to pay for those connections. Conditions have not been the same in developing nations, but the world is changing.

According to the ITU, there were 4,000 broadband Internet users in Indonesia in 2000. In 2011, there are 2.7 million. The picture starts to get interesting when you consider smartphone penetration. An adsmobi report shows that Indonesia had an estimated 30.7-million smartphone users at the end of 2012, and that number is expected to nearly triple to 81.5 million by 2015. In the eleven-year span between 2000 to 2011, the number of smartphone users in Turkey went from zero to over 7 million. A year later in 2012, that number more than doubled to around 15 million — nearly 20% population penetration. This trend is playing itself out globally, the digital divide is getting smaller and the opportunity to provide service in these markets is getting larger.

What does that mean for you and your business online? You want to capitalize on these burgeoning markets and build your service or application to easily reach a global audience and scale to meet that audience's demand, but that's a pretty daunting task. You need to deliver a seamless experience to millions of users who live thousands of miles away and who may be accessing a completely different Internet than your users down the street.

The idea that large groups of users are accessing a "completely different Internet" may seem like an overly dramatic way to talk about their unique preferences and cultural/language differences, but I use that phrase very literally. As the global allocation of IPv4 addresses dwindles, Internet Service Providers will bring new users online via IPv6 addresses, and those users will only be able to access sites and applications that have IPv6 addresses. IPv6 addresses can run dual-stack with IPv4 addresses — the same content can be delivered via either protocol from the same server — but many legacy hosting providers haven't made the necessary upgrades to make every piece of network hardware IPv6-compatible.

As you consider the challenge of preparing for a global boom in users, keep these suggestions in mind:

  • Leverage a global infrastructure. You might not have the capital to build infrastructure around the world, so look for an IaaS partner that can provide resources in your targeted geographic markets. You need to be able to easily spin up IT resources where and when you need them to meet regional demand.
  • Get close to your end users. Proximity to customers and new markets is vital. You might not be able to host a server next door to every one of your users, but if you can get those users on your network quickly, they'll have the same kind of high-speed access to the content in your closest data center.
  • Don't pay too much. A simple pay-as-you-go service model helps the process of planning and growing strategically. You're able to focus on what you do best while avoiding the pitfalls of managing IT hardware.
  • Prepare for the future. Overarching technology concerns like the one I mentioned about IPv6 might not be very high on your list of priorities because they're just theoretical ... until they're not. By preparing for those future challenges, you'll save yourself a lot of grief when those "future" challenges eventually become "present" challenges.

SoftLayer has 13 data centers strategically located around the world, and we offer the same on-demand provisioning and month-to-month contracts in all of our facilities. We're continuing to build our network infrastructure to bring users onto our network via one of our network Points of Presence (PoPs) within 40 milliseconds from anywhere in the world. Our platform is IPv6-capable, and we have a team of people focused on finding and addressing future technological concerns before they impact our customers.

SoftLayer Global Network Map

To find out more about how your business can go global with SoftLayer, check out our network overview and learn more about what differentiates SoftLayer's data centers from the competition's.

-@quigleymar

May 22, 2013

Catalyst at SXSW 2013: Startup Community Partners

Much of the buzz you've heard about Catalyst has to do with our relationships with the entrepreneurs and startups we support around the world. That buzz is understandable since the hosting, mentorship and networking perks of the program are the most visible aspects of the program, but to truly understand why Catalyst has been so successful, we have to shine the spotlight on our partner organizations in the startup community. Without close ties to the most powerful and successful startup-focused organizations, my team would have a much tougher time meeting and introducing the best and brightest startups to SoftLayer's platform.

When the folks on the Community Development team are not working directly with the companies in the Catalyst, they're looking for opportunities to help and serve our huge network of business incubators, accelerators, co-working spaces and startup events. As a result, we stay pretty busy. To give you an idea of what a given month looks like for us, Catalyst is supporting seventeen different startup-related events in six different countries over the course of the next thirty days. We're lucky that we love what we do so much ... Otherwise, that schedule might seem pretty daunting.

If you've been an avid SoftLayer Blog reader (as you should be), you know that we work closely with organizations like TechStars and 500 Startups, but you haven't heard much about the other types of partnerships we build in the startup community. We want to provide Catalyst companies with resources outside of hosting that can make their lives easier, and that means we have to find killer partners that focus specifically on the needs and wants of startup companies. To give you an idea of what those partners look like, I'd like to introduce you to a few of them via their video interviews from SoftLayer's Catalyst Startup Lounge at SXSW:

As we've done with the Startups Speak interviews, we'll be adding videos from our partners to the YouTube playlist above so that you can meet them and learn more about the value they uniquely provide to the startup community.

I'd love to take more time to explain how we incorporate services from these partners in the Catalyst program, but I think I'm late for a plane to Vancouver ... or Chicago ... or New York ... or San Francisco. In any case, I should probably head to the airport.

-@PaulFord

May 15, 2013

Secure Quorum: Tech Partner Spotlight

We invite each of our featured SoftLayer Tech Marketplace Partners to contribute a guest post to the SoftLayer Blog, and this week, we’re happy to welcome Gerard Ibarra from Secure Quorum. Secure Quorum is an easy-to-use emergency notification system and crisis management system that resides in the cloud.

Are You Prepared for an Emergency?

Every company's management team faces the challenge of having too many things going on with not enough time in the day. It's difficult to get everything done, so when push comes to shove, particular projects and issues need to be prioritized to be completed. What do we have to do today that can't be put off to tomorrow? Often, a businesses fall into a reactionary rut where they are constantly "putting out the fires" first, and while it's vital for a business to put out those fires (literal or metaphorical), that approach makes it difficult to proactively prepare for those kinds of issues to streamline the process of resolving them. Secure Quorum was created to provide a simple, secure medium to deal with emergencies and incidents.

What we noticed was that businesses didn't often consider planning for emergencies as part of their operations. The emergencies I'm talking about thankfully don't happen often, but fires, accidents, power outages, workplace violence and denial of service attacks can severely impact the bottom line if they aren't addressed quickly ... They can make or break you. Are you prepared?

Every second that we fail to make informed and logical decisions during an emergency is time lost in taking action. Take these facts for a little perspective:

  • "Property destruction and business disruption due to disasters now rival warfare in terms of loss." (University Corporation for Atmospheric Research)
  • More than 10,000 severe thunderstorms, 2,500 floods, 1,000 tornadoes and 10 hurricanes affect the United States each year. On average, 500 people die yearly because of severe weather and floods. (National Weather News 2005)
  • The cost of natural disasters is rising. During the past two decades, natural disaster damage costs have exceeded the $500 billion mark. Only 17 percent of that figure was covered by insurance. (Dennis S. Mileti, Disasters by Design)
  • Losses as a result of global disasters continue to increase on average every year, with an estimated $360 billion USD lost in 2011. (Centre for Research in the Epidemiology of Disasters)
  • Natural disasters, power outages, IT failures and human error are common causes of disruptions to internal and external communications. They "can cause downtime and have a significant negative impact on employee productivity, customer retention, and the confidence of vendors, partners, and customers." (Debra Chin, Palmer Research, May 2011)

These kinds of "emergencies" are not going away, but because specific emergencies are difficult (if not impossible) to predict, it's not obvious how to deal with them. How do we reduce risk for our employees, vendors, customers and our business? The two best answers to that question are to have a business continuity plan (BCP) and to have a way to communicate and collaborate in the midst of an emergency.

Start with a BCP. A BCP is a strategic plan to help identify and mitigate risk. Investopedia gives a great explanation:

The creation of a strategy through the recognition of threats and risks facing a company, with an eye to ensure that personnel and assets are protected and able to function in the event of a disaster. Business continuity planning (BCP) involves defining potential risks, determining how those risks will affect operations, implementing safeguards and procedures designed to mitigate those risks, testing those procedures to ensure that they work, and periodically reviewing the process to make sure that it is up to date.

Make sure you understand the basics of a BCP, and look for cues from organizations like FEMA for examples of how to approach emergency situations: http://www.ready.gov/business-continuity-planning-suite.

Once you have a basic BCP in place, it's important to be able to execute it when necessary ... That's where an emergency communication and collaboration solution comes into play. You need to streamline how you communicate when an emergency occurs, and if you're relying on a manual process like a phone tree to spread the word and contact key stakeholders in the midst of an incident, you're wasting time that could better be spent focusing to the issue at hand. An emergency communication solution automates that process quickly and logically.

When you create a BCP, you consider which people in your organization are key to responding to specific types of emergencies, and if anything ever happens, you want to get all of those people together. An emergency communication system will collect the relevant information, send it to the relevant people in your organization and seamlessly bridge them into a secured conference call. What would take minutes to complete now takes seconds, and when it comes to responding to these kinds of issues, seconds count. With everyone on a secure call, decisions can be made quickly and recorded to inform employees and stakeholders of what occurred and what the next steps are.

Plan for emergencies and hope that you never have to use that plan. Think about preparing for emergencies strategically, and it could make all the difference in the world. Secure Quorum is a platform that makes it easy to communicate and collaborate quickly, reliably and securely in those high-stress situations, so if you're interested getting help when it comes to responding to emergencies and incidents, visit our site at SecureQuorum.com and check out the whitepaper we just published with one of our customers: Ease of Use: Make it Part of Your Software Decision.

-Gerard Ibarra, CEO of Secure Quorum

This guest blog series highlights companies in SoftLayer's Technology Partners Marketplace.
These Partners have built their businesses on the SoftLayer Platform, and we're excited for them to tell their stories. New Partners will be added to the Marketplace each month, so stay tuned for many more come.
May 14, 2013

Interop 2013 - SoftLayer + Supermicro Server Challenge II

The SoftLayer team visited Las Vegas for Interop 2013, and attendees from around the world stopped by our booth to take on the infamous Server Challenge II. The challenge was completed more than two hundred and fifty times with an average time of 1:31.34.

The Server Challenge II "Hall of Fame" was particularly competitive at Interop 2013. Only 8 seconds separated our first place finisher from tenth place:

Interop Server Challenge

Jim Chrapowicz recorded the competition-winning time of 58.40 seconds (after a 5-second penalty for not closing one of the latches), edging out the second place time by a razor-thin margin of less than two tenths of a second. For his Server Challenge II heroics, Jim is being rewarded with the MacBook Air grand prize, and everyone who made the top ten list will be receiving $25 iTunes gift cards. Here's video of the winning completion:

Take a look at some of the other action from the show floor:

Interop Server Challenge

Interop Server Challenge

Interop Server Challenge

Interop Server Challenge

About the Server Challenge II

The Server Challenge II is a race to reassemble a scaled-down version of a SoftLayer server rack. Participants are tasked with repopulating the drive bays of two 2U Supermicro servers and plugging 18 network cables into network switches. The competition provides conference attendees with a fun opportunity to get hands-on with the servers and network gear that fuel SoftLayer's global cloud infrastructure platform. For more information about the Server Challenge II, check out "Server Challenge II: How SoftLayer Saves the World."

About SoftLayer

SoftLayer operates a global cloud infrastructure platform built for Internet scale. Spanning 13 data centers in the United States, Asia and Europe and a global footprint of network points of presence, SoftLayer's modular architecture provides unparalleled performance and control, with a full-featured API and sophisticated automation controlling a flexible unified platform that seamlessly spans physical and virtual devices, and a global network for secure, low-latency communications. With 100,000 devices under management, SoftLayer is the largest privately held Infrastructure-as-a-Service (IaaS) provider in the world with a portfolio of leading-edge customers from Web startups to global enterprises. For more information, visit softlayer.com.

About Supermicro

Supermicro, the leading innovator in high-performance, high-efficiency server technology is a premier provider of advanced server Building Block Solutions for Data Center, Cloud Computing, Enterprise IT, Hadoop/Big Data, HPC and Embedded Systems worldwide. Supermicro is committed to protecting the environment through its "We Keep IT Green" initiative and provides customers with the most energy-efficient, environmentally-friendly solutions available on the market. For more information, visit supermicro.com.

May 10, 2013

Understanding and Implementing Coding Standards

Coding standards provide a consistent framework for development within a project and across projects in an organization. A dozen programmers can complete a simple project in a dozen different ways by using unique coding methodologies and styles, so I like to think of coding standards as the "rules of the road" for developers.

When you're driving in a car, traffic is controlled by "standards" such as lanes, stoplights, yield signs and laws that set expectations around how you should drive. When you take a road trip to a different state, the stoplights might be hung horizontally instead of vertically or you'll see subtle variations in signage, but because you're familiar with the rules of the road, you're comfortable with the mechanics of driving in this new place. Coding standards help control development traffic and provide the consistency programmers need to work comfortably with a team across projects. The problem with allowing developers to apply their own unique coding styles to a project is the same as allowing drivers to drive as they wish ... Confusion about lane usage, safe passage through intersections and speed would result in collisions and bottlenecks.

Coding standards often seem restrictive or laborious when a development team starts considering their adoption, but they don't have to be ... They can be implemented methodically to improve the team's efficiency and consistency over time, and they can be as simple as establishing that all instantiations of an object must be referenced with a variable name that begins with a capital letter:

$User = new User();

While that example may seem overly simplistic, it actually makes life a lot easier for all of the developers on a given project. Regardless of who created that variable, every other developer can see the difference between a variable that holds data and one that are instantiates an object. Think about the shapes of signs you encounter while driving ... You know what a stop sign looks like without reading the word "STOP" on it, so when you see a red octagon (in the United States, at least), you know what to do when you approach it in your car. Seeing a capitalized variable name would tell us about its function.

The example I gave of capitalizing instantiated objects is just an example. When it comes to coding standards, the most effective rules your team can incorporate are the ones that make the most sense to you. While there are a few best practices in terms of formatting and commenting in code, the most important characteristics of coding standards for a given team is consistency and clarity.

So how do you go about creating a coding standard? Most developers dislike doing unnecessary work, so the easiest way to create a coding standard is to use an already-existing one. Take a look at any libraries or frameworks you are using in your current project. Do they use any coding standards? Are those coding standards something you can live with or use as a starting point? You are free to make any changes to it you wish in order to best facilitate your team's needs, and you can even set how strict specific coding standards must be adhered to. Take for example left-hand comparisons:

if ( $a == 12 ) {} // right-hand comparison
if ( 12 == $a ) {} // left-hand comparison

Both of these statements are valid but one may be preferred over the other. Consider the following statements:

if ( $a = 12 ) {} // supposed to be a right-hand comparison but is now an assignment
if ( 12 = $a ) {} // supposed to be a left-hand comparison but is now an assignment

The first statement will now evaluate to true due to $a being assigned the value of 12 which will then cause the code within the if-statement to execute (which is not the desired result). The second statement will cause an error, therefore making it obvious a mistake in the code has occurred. Because our team couldn't come to a consensus, we decided to allow both of these standards ... Either of these two formats are acceptable and they'll both pass code review, but they are the only two acceptable variants. Code that deviates from those two formats would fail code review and would not be allowed in the code base.

Coding standards play an important role in efficient development of a project when you have several programmers working on the same code. By adopting coding standards and following them, you'll avoid a free-for-all in your code base, and you'll be able to look at every line of code and know more about what that line is telling you than what the literal code is telling you ... just like seeing a red octagon posted on the side of the road at an intersection.

-@SoftLayerDevs

May 7, 2013

Tips from the Abuse Department: DMCA Takedown Notices

If you are in the web hosting business or you provide users with access to store content on your servers, chances are that you're familiar with the Digital Millennium Copyright Act (DMCA). If you aren't familiar with it, you certainly should be. All it takes is one client plagiarizing an article or using a filesharing program unscrupulously, and you could find yourself the recipient of a scary DMCA notice from a copyright holder. We've talked before about how to file a DMCA complaint with SoftLayer, but we haven't talked in detail about SoftLayer's role in processing DMCA complaints or what you should do if you find yourself on the receiving end of a copyright infringement notification.

The most important thing to understand when it comes to the way the abuse team handles DMCA complaints is that our procedures aren't just SoftLayer policy — they are the law. Our role in processing copyright complaints is essentially that of a middleman. In order to protect our Safe Harbor status under the Online Copyright Infringement Liability Limitation Act (OCILLA), we must enforce any complaint that meets the legal requirements of a takedown notice. That DMCA complaint must contain specific elements and be properly formatted in order to be considered valid.

Responding to a DMCA Complaint

When we receive a complaint that meets the legal requirements of a DMCA takedown notice, we must relay the complaint to our direct customer and enforce a deadline for removal of the violating material. We are obligated to remove access to infringing content when we are notified about it, and we aren't able to make a determination about the validity of a claim beyond confirming that all DMCA requirements are met.

The law states that SoftLayer must act expeditiously, so if you receive notification of a DMCA complaint, it's important that you acknowledge the ticket that the abuse department opened on your account and let us know your intended course of action. Sometimes that action is as simple as removing an infringing URL. Sometimes you may need to contact your client and instruct them to take the material down. Whatever the case may be, it's important to be responsive and to expressly confirm when you have complied and removed the material. Failure to acknowledge an abuse ticket can result in disconnection of service, and in the case of copyright infringement, SoftLayer has a legal obligation to remove access to the material or we face serious liability.

DMCA Counter Notifications

Most DMCA complaints are resolved without issue, but what happens if you disagree with the complaint? What if you own the material and a disgruntled former business partner is trying to get revenge? What if you wrote the content and the complaining party is copying your website? Thankfully there are penalties for filing a false DMCA complaint, but you also have recourse in the form of a counter notification. Keep in mind that while it may be tempting to plead your case to the abuse department, our role is not to play judge or jury but to allow the process to work as it was designed.

In some cases, you may be able to work out a resolution with the complaining party directly (misunderstandings happen, licenses lapse, etc.) and have them send a retraction, but most of the time your best course of action is to submit a counter notification.

Just as a takedown notice must be crafted in a specific way, counter notifications have their own set of requirements. Once you have disabled the material identified in the original complaint, we can provide your valid, properly formatted counter notification to the complaining party. Unless we receive a court order from the complaining party within the legally mandated time frame the material can be re-enabled and the case is closed for the time being.

While it might sound complicated, it's actually pretty straightforward, but we urge you to do your research and make sure you know what to do in the event a client of yours is hit with a DMCA takedown notice. Just as we are unable to make judgment calls when it comes to takedown notices or counter notifications, we are also unable to offer any legal advice for you if you need help. Hopefully this post cleared up a few questions and misconceptions about how the abuse department handles copyright complaints. In short:

Do take DMCA notifications seriously. You are at risk for service interruption and possible legal liability.
Do respond to the abuse department letting them know the material has been disabled and, if applicable, if you plan to file a counter notification.
Don't refuse to disable the material. Even if you believe the claim is false and you wish to file a counter notification, the material must be disabled within the time period allotted by the abuse department or we have to block access to it.
Don't expect the abuse department to take sides.

As with any abuse issue, communication and responsiveness is important. Disconnecting your server is a last resort, but we have ethical and legal obligations to uphold. The DMCA process certainly has its weaknesses and it leaves a bit to be desired, but at the end of the day, it's the law, and we have to operate inside of our legal obligation to it.

-Jennifer

Pages

Subscribe to 3-bars-3-questions